RUS  ENG
Full version
JOURNALS // Informatics and Automation // Archive

Tr. SPIIRAN, 2016 Issue 46, Pages 108–127 (Mi trspy882)

This article is cited in 3 papers

Information Security

Recognizing Parameters of the Information Security Unit Implemented by the Threshold K-Valued Function

A. V. Burdeljova, V. G. Nikonovb, I. I. Lapikovc

a Belarusian State University (BSU)
b Russian Academy of natural Sciences
c "RDI "KVANT"

Abstract: This article discusses some approaches to the recognition of the parameters of the threshold k-valued functions, which can be used for building information processing and security units. The main focus is put on the issue of proving k-valued function belonging to the threshold class. For solving this problem it is proposed to use the input coefficients of expansion and increase. With the help of the latter, the coefficients of linear forms of the k-valued threshold function are procedurally approximated. Along with the proposed analytical approach, the article discusses an algorithmic method based on reducing the problem of finding a threshold representation of k-valued functions to the system of linear inequalities, for the solution of which the ellipsoid method, modified by Khachiyan, is applied. The comparative analysis of the proposed methods is carried out based on experiments.

Keywords: threshold k-valued function; threshold logic; ellipsoid method; the characterization of threshold functions.

UDC: 512.55

DOI: 10.15622/sp.46.9



Bibliographic databases:


© Steklov Math. Inst. of RAS, 2024